OTHERS_CITABLE
ARTEMIS: A Simulator Tool for Heterogeneous Network-on-Chip
Complex homogeneous network-on-chip or heterogeneous network-on-chip increases the need of determining and developing simulation tools for designer to evaluate and comparison network performance. Towards this end, ARTEMIS tool, a matlab based simulator environment is developed. This simulator offers some collections of network configuration regarding to the topology graph, routing algorithm and switching strategy, including allocation scheme for a target application. Consequently, designers can choose the number and depth of virtual channels and the capacity of each link by applying an efficient allocation scheme, which is provided by this tool. Average latency and throughput are evaluation performance metrics that are measured with proposed simulator tool.
http://ijict.itrc.ac.ir/article-1-36-en.pdf
2017-06-15
1
9
interconnection network
homogeneous NoC
heterogeneous NoC
simulator
performance
Fatemeh
Vardi
1
AUTHOR
Ahmad
Khadem Zadeh
2
AUTHOR
Midia
Reshadi
3
AUTHOR
OTHERS_CITABLE
An Attack-Defense Model for the Binder on the Android Kernel Level
In this paper, we consider to seek vulnerabilities and we conduct possible attacks on the crucial and essential parts of Android OSs architecture including the framework and the Android kernel layers. As a regard, we explain the Binder component of Android OS from security point of view. Then, we demonstrate how to penetrate into the Binder and control data exchange mechanism in Android OS by proposing a kernel level attack model based on the hooking method. In addition, we provide a method to detect these kinds of attacks on Android frameworks and the kernel layer. As a result, by implementing the attack model, it is illustrated that the Android processes are detectable and the data can be extracted from any process and system calls. On the other hand, by using our detection proposed method the possibility of using this attack approach in the installed applications on the Android smartphones will be sharply decreased.
http://ijict.itrc.ac.ir/article-1-37-en.pdf
2017-06-15
11
17
smartphone security
android security
android penetration testing
binder component
kernel level attack
majid
Salehi
1
AUTHOR
Mohammad Hesam
Tadayon
2
AUTHOR
Farid
Daryabar
3
AUTHOR
OTHERS_CITABLE
A Probabilistic Topic Model based on an Arbitrary-Length Co-occurrence Window
Probabilistic topic models have been very popular in automatic text analysis since their introduction. These models work based on word co-occurrence, but are not very flexible with respect to the context in which cooccurrence is considered. Many probabilistic topic models do not allow for taking local or spatial data into account. In this paper, we introduce a probabilistic topic model that benefits from an arbitrary-length co-occurrence window and encodes local word dependencies for extracting topics. We assume a multinomial distribution with Dirichlet prior over the window positions to let the words in every position have a chance to influence topic assignments. In the proposed model, topics being shown by word pairs have a more meaningful presentation. The model is applied on a dataset of 2000 documents. The proposed model produces interesting meaningful topics and reduces the problem of sparseness.
http://ijict.itrc.ac.ir/article-1-38-en.pdf
2017-06-15
19
25
probabilistic topic modeling
co-occurrence
context window
Gibbs sampling
generative models
Marziea
Rahimi
1
AUTHOR
Morteza
Zahedi
2
AUTHOR
Hoda
Mashayekhi
3
AUTHOR
OTHERS_CITABLE
A Novel Density based Clustering Method using Nearest and Farthest Neighbor with PCA
Common nearest-neighbor density estimators usually do not work well for high dimensional datasets. Moreover, they have high time complexity of O(n2) and require high memory usage especially when indexing is used. In order to overcome these limitations, we proposed a new method that calculates distances to nearest and farthest neighbor nodes to create dataset subgroups. Therefore computational time complexity becomes of O(nlogn) and space complexity becomes constant. After subgroup formation, assembling technique is used to derive correct clusters. In order to overcome high dimensional datasets problem, Principal Component Analysis (PCA) in the clustering method is used, which preprocesses high-dimensional data. Many experiments on synthetic data sets are carried out to demonstrate the feasibility of the proposed method. Furthermore we compared this algorithm to the similar algorithm –DBSCAN- on real-world datasets and the results showed significantly higher accuracy of the proposed method.
http://ijict.itrc.ac.ir/article-1-39-en.pdf
2017-06-15
27
34
nearest_neighbor density estimator
farthest neighbor
subgroups
principal component analysis(PCA)
Azadeh
Faroughi
1
AUTHOR
Reza
Javidan
2
AUTHOR
OTHERS_CITABLE
Persian Wordnet Construction using Supervised Learning
This paper presents an automated supervised method for Persian wordnet construction. Using a Persian corpus and a bi-lingual dictionary, the initial links between Persian words and Princeton WordNet synsets have been generated. These links will be discriminated later as correct or incorrect by employing seven features in a trained classification system. The whole method is just a classification system which has been trained on a train set containing a pre-existing Persian wordnet, FarsNet, as a set of correct instances. A set of some sophisticated distributional and semantic features is proposed to be used in the classification system. Furthermore, a set of randomly selected links have been added to training data as incorrect instances. The links classified as correct are collected to be included in the final wordnet. State of the art results on the automatically derived Persian wordnet is achieved. The resulted wordnet with a precision of 91.18% includes more than 16,000 words and 22,000 synsets.
http://ijict.itrc.ac.ir/article-1-40-en.pdf
2017-06-15
35
44
wordnet
ontology
supervised
Persian language
Zahra
Mousavi
1
AUTHOR
Heshaam
Faili
2
AUTHOR
Marzieh
Fadaee
3
AUTHOR
OTHERS_CITABLE
Critical Success factors for implementing PACS Technology in Iran\'s Hospitals
This study clarified the critical success factors (CSFs) that effect on adopting and implementing PACS and its applications in Iranian hospitals. We identified CSFs by literature review and interview by experts. Then examined its importance by T-test with 110 respondents. Kaiser-Meyer test and Varimax rotation are used for validity of data. Factor analysis is used for clustering. And the results are examined in 11hospitals who have implemented PACS. 20 of 23 CSFs, are distinguished important by T-test and clustered in 6 groups by Factor analysis. (1st) Ability to choose and purchase the appropriate PACS; (2nd) Being patient-centered and paying attention to patient satisfaction; were the most important CSFs. 77% questionnaires were completed by less than 2% miss data. The results are approved in 11 hospitals in Iran. This paper fulfils an identified need to study how PACS can be adopted in Iran's hospital by determining 6 CSFs. They can be applicable for policy makers and managers of other hospitals of Iran and some developing countries such as Iran to use of PACS as integrated IT technology.
http://ijict.itrc.ac.ir/article-1-41-en.pdf
2017-06-15
45
52
PACS
Cloud computing
Futures trends
CSF
decision makers
Fatemeh
Saghafi
1
AUTHOR
Zainabolhoda
Heshmati
2
AUTHOR
Mahmood
Heydari
3
AUTHOR
Mohammad
Khansari
4
AUTHOR
OTHERS_CITABLE
A Security Mechanism for Detecting Intrusions in Internet of Things Using Selected Features Based on MI-BGSA
Internet of things (IoT) is a novel emerging approach in computer networks wherein all heterogeneous objects around us, which usually are resource-constrained objects, can connect to each other and also the Internet by using a broad range of technologies. IoT is a hybrid network which includes the Internet and also wireless sensor networks (WSNs) as the main components of IoT; so, implementing security mechanisms in IoT seems necessary. This paper introduces a novel intrusion detection architecture model for IoT that provides the possibility of distributed detection. The proposed hybrid model uses anomaly and misuse intrusion detection agents based on the supervised and unsupervised optimum-path forest models for providing the ability to detect internal and externals attacks, simultaneously. The number of input features to the proposed classifier is reduced by a hybrid feature selection algorithm, as well. The experimental results of simulated scenarios show the superior performance of proposed security mechanism in multi-faceted detection.
http://ijict.itrc.ac.ir/article-1-42-en.pdf
2017-06-15
53
62
Internet of things
intrusion detection
anomaly-based
misuse-based
optimum-path forest
Mansour
Sheikhan
1
AUTHOR
Hamid
Bostani
2
AUTHOR